{"title":"The Cyber Forensics and The Ipc Laws For Cyber Criminal’s","authors":"Shivam Jaiswal, H. Patil","doi":"10.46610/jcspic.2022.v01i03.001","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i03.001","url":null,"abstract":"Our lives have become increasingly dependent on computers. We do things differently because of them. Cybercrime is steadily rising as a result. Criminal activity has become a global phenomenon, and criminals have realized that, to continue their criminal activity, they must keep up with the times. The need to determine precisely what happened is therefore critical. A technique known as \"cyber forensics\" can aid this process. The global phenomenon has been impacted by Cybercriminals that have adapted more advanced tools and tactics. Anti-forensic techniques are also being used by these attackers to disguise evidence of cybercrime. . Cybercrime refers to the crimes/offenses committed online. Cyber law was introduced to stop or punish cyber criminals. As a branch of law, cyber-law focuses on cyberspace, the Internet, and legal issues.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131030512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Review on Cybersecurity & Data Protection","authors":"Ryan Nambiar, Flavia Gonsalves","doi":"10.46610/jcspic.2022.v01i02.002","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i02.002","url":null,"abstract":"This paper identifies the understanding of Cybersecurity. This paper analyses the awareness, presence and challenges of Cybersecurity and Data protection. This paper also identifies what people think about Cybersecurity as well as measures we can use to strengthen Cybersecurity.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Effects of Software Reuse in Project Development","authors":"Sujeet Devadatta Gawade, H. Patil","doi":"10.46610/jcspic.2022.v01i02.001","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i02.001","url":null,"abstract":"Software reuse is the process of reusing software resources. In a new application, all stages of the software development process. Given the high cost and difficulty of building high-quality software, the idea of leveraging earlier software investments is intriguing; yet, software reuse has not shown to be as effective as anticipated and is not widely or systematically adopted in business.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}